Cloud infestation by networked attacks (current state) vs. (old school) system infection by virus

When your cloud assets are breached by a virus ….

Scenario 1 (old school):

Your machine gets a virus on it. You use anti-virus to kill it, or rebuild … move on with your life.
  • Future impact: Zero
  • Cost: One time

Scenario 2 (most businesses and product teams)

Your cloud environment gets infected with a virus / ransomware. Now though instead of just one machine, this virus (for simplicity of writing) moves within the environment infects other systems. After initial infect, this virus calls back to a command and control server and shares intelligence about the hosts it has infected (ip address space, user details, security protocols, vpn details, routing tables, user information, and any database details, etc…). These details, much like a robo-call spammer, are logged and shared with other attack networks and targeted further, but now customized to the infected host footprints.
The result – higher success rate of breach for similarly managed systems. Higher value to attackers who now have rich data store to attack and to sell on black market for interested parties.
  • Future Impact: High and frequent
  • Cost: Ongoing
The impact of such a breach is best understood when the fact that these are networked attacks is acknowledged. These are learning attacks that build upon prior successes. To undo the damage, full system refreshes are required, all of the keys that linked to those environments need to be reset, and any tokens or ‘obfuscation’ techniques changed. Cloud allows for auto-scaling and self-healing, but it works the other way too. Attackers can auto-customize their attacks to fit our profile.
Act accordingly

All can rejoice, officially sensible Password Best Practices published – now to undo decades of bad habits

After decades of making passwords harder and harder manage, while the whole time every security professional and data scientist could show you how it did not make account credentials more secure, NIST recently published their four-volume SP800-63-3 Digital Identity Guidelines that made it official.

This is a brave release and the first step for private industry to now take the lead at the product innovation, customer experience, and classic computing system usage around authentication and authorization. They make three important suggestions when it comes to passwords:

  • Stop it with the annoying password complexity rules. They make passwords harder to remember. They increase errors because artificially complex passwords are harder to type in. And they don’t help that much. It’s better to allow people to use pass phrases.
  • Stop it with password expiration. That was an old idea for an old way we used computers. Today, don’t make people change their passwords unless there’s indication of compromise.
  • Let people use password managers. This is how we deal with all the passwords we need.

Bruce Schneier highlighted these 3 bullets and has an excellent discussion occurring in the comments. I recommend developers, security professionals, and businesses review these guidances from NIST and make the right choices! Source: Changes in Password Best Practices – Schneier on Security

Cloud Natural Language API  |  Google Cloud Platform

Playing with some projects on the intersection between human expression and the state of affairs related to hobbies. Explored natural speech and sentiment analysis. Worthwhile to those interested in parsing large spans of consumer experiences.

The applications to cybersecurity are immense. I look froward to sharing my experiences and open source adventures.

Analyze text using ML to extract relevant entities, understand the overall sentiment, identify parts of speech and create dependency parse trees.

Source: Cloud Natural Language API  |  Google Cloud Platform

Paper demonstrating viable attack between chipsets and a device’s main processor 

Interesting paper demonstrating a threat vector from replacement parts to consumer (easily commercial / industrial) electronic devices. This paper shows, ‘attacks by malicious peripherals are feasible, scalable, and invisible to most detection techniques.’ The authors of the paper demonstrate several use cases and prove the effectiveness of the technology.

Product cybersecurity extends well beyond the development and operate life cycle of a product, and clearly requires the maintenance phase too. The greatest challenge will be the attractiveness of non-branded 3rd party parts due to their $ savings and lack of IP protection. Other ideas and thoughts?

Click to access Shattered.pdf

 

2017 State of DevOps Report, the pulse of development work patterns

One of my favorite snapshots into the current flight of product development team work patterns, habits, and cultures. Download it, it is free and THE source for catching the pulse and benefits of DevOps.

Here are a few things you’ll learn in this year’s report:

  • How DevOps practices affect deployment frequency, lead time, change failure rate and MTTR
  • The influence leadership has on DevOps transformationsHow high- and low-performing teams automate differently
  • The impact of architecture and team structure on IT performance
  • How DevOps helps organizations reach both their financial and non-financial goals

Source: 2017 State of DevOps Report, presented by Puppet and DORA